Distributors

In the course of researching and preparing volume 9 of the Security Intelligence Report, Microsoft analysts discovered an interesting trend. According to Microsoft's findings, attacks against Java have recently surged to unprecedented levels -- dwarfing attacks against Adobe PDFs.

Microsoft is accustomed to being a prime target for malware attacks, and Adobe has been hogging center stage for a while as well. But, a post on the Microsoft Malware Protection Center (MMPC) blog notes, "by the beginning of this year, the number of Java exploits (and by that I mean attacks on vulnerable Java code, not attacks using JavaScript) had well surpassed the total number of Adobe-related exploits we monitored."

Attacks on Java make sense for precisely the same reason that attacks on Adobe make sense. A malware developer that has to choose which operating system platform to attack will choose Microsoft because it offers significantly more potential targets. But, as Microsoft has developed more secure applications, and improved security controls, attackers have discovered that third-party cross-platform technologies are often a weak spot in the security armor.

Microsoft's Holly Stewart explains in the MMPC blog, "Java is ubiquitous, and, as was once true with browsers and document readers like Adobe Acrobat, people don't think to update it. On top of that, Java is a technology that runs in the background to make more visible components work. How do you know if you have Java installed or if it's running?"

Stewart also raises the question of why this surge in Java attacks seems to have flown under the radar. She dubs the phenomenon "Java-blindness". Essentially, Stewart theorizes that the IPS (Intrusion Prevention System) products that we expect to detect and identify new threats are blind to Java because the performance impact of interpreting Java in real-time is too great.

While the number of attacks against Java spiked, the attacks focused primarily on three Java vulnerabilities. More importantly, all three Java flaws already had patches available. Java just kind of runs silently doing its thing, though, so--while users and IT admins focus on Microsoft's monthly Patch Tuesday updates, or Adobe's quarterly security patches--Java is sort of "out of sight, out of mind" and vulnerabilities may go unpatched.

In the grand scheme of things, the attacks on Java are a drop in the bucket. The surge in Java attacks may be significant and unprecedented, but Java is still a relative blip on the radar. That said, Microsoft's findings highlight an alarming trend, and should provide incentive for users and IT admins to be more diligent about identifying and patching vulnerabilities in third-party apps that could expose systems to attack.

Slideshows

ARN Connect - How can partners create customer value through cloud and security?

This exclusive ARN Connect event, in association with Juniper Networks and Westcon-Comstor, deep dived into the key customer priorities during the next 12 months, outlining emerging partner opportunities while drawing up a blueprint for cloud and security success.

Selling beyond the CIO – How partners can influence the new breed of tech buyers

This ARN Roundtable, in association with Oracle, highlighted the emergence of a new breed of technology buyer, assessing how partners can engage outside of IT, and the skills required to sell across new business units.

Copyright 2018 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.